• Title/Summary/Keyword: 안전보장

Search Result 1,603, Processing Time 0.032 seconds

International Legal Regulation on Commercial Space Activity (상업적 우주활동의 국제법적 규제)

  • Lee, Young-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.183-221
    • /
    • 2013
  • While in the early stages of space activities only a few states engaged in the use of outer space, as is well known, commercial space activities have grown dramatically in recent years. Both states, state institutions, and international governmental organizations as well as many private enterprises are engaged in such commercial use of outer space by now. This development is not reflected in the present state of space law. The existing international instruments of space law were developed and finalized before this development and thus only provide very few and sometimes unfitting provisions for the commercial use of outer space and particularly the use by private enterprises. Law formulated in an era when the word "privatization" had not even been coined cannot contain potential problems caused by the increasing commercialization of outer space. For the promotion and further development of such commercial use of outer space it is necessary to clarify and establish the legal framework for such use, because participants will need this information for their future investments in this field. The purpose of this paper is to research and make an analysis of the contents and international regulation of international space commerce, which is rapidly proliferating and to review the process of improvement on national legislations relating to the commercialization of outer space in a few main space advanced countries to make the sustainable progress of commercial space activities project in international society. The legal implications of matters such as international commercial launch services, the liability aspects of such services, intellectual property rights, insurance, product liability insurance and materials processing could one day will be subject to regulated by international space law as well as domestic law. In fact, the question of commercialization is linked to the question of sharing benefits of space activities, and this currently is an agenda item in the Legal Subcommittee of UN COPUOS. Most of developed countries have enacted the national legislation for commercial space activities relating to the development of our space as follows : The National Aeronautic and Space Act of 1958 and the Commercial Space Act of 1998 in the United States, Outer Space Act of 1986 in England, Establishment Act of National Space Center of 1961 in France, Canadian Space Agency Act of 1990 in Canada, Space Basic Act of 2008 in Japan, and Law on Space Activity of 1993 in Russia. Becides there are currently three national legislations relating to space development and commercial space activities in Korea as follows : Aerospace Industry Development Promotion Act of 1987, Outer Space Development Promotion Act of 2005, Outer Space Damage Compensation Act of 2008. Commercial space great promise for the utilization and expansion of human outer space activities but aspring commercial actors must recognize that foreign policy, as well as obligations to the international community as a whole, ensure that commercial space activities will not operate in a legal and regulatory vacuum. As commercial space matures the law and accompanying regulation will most certainly evolve and choose to become participants in the inevitable evolution of law and regulation.

  • PDF

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Cognition and Satisfaction of Customer in Home-delivered Meal (가정배달급식에 대한 고객의 인식 및 만족도 조사)

  • 김혜영;류시현
    • Korean journal of food and cookery science
    • /
    • v.19 no.4
    • /
    • pp.529-538
    • /
    • 2003
  • The objectives of this study were to measure customers' cognition and overall satisfaction, and to identify relatively important attributes for the overall satisfaction, of home-delivered meals. Questionnaires were distributed to 243 customers. The statistical data analyses were completed by x$^2$-tests, ANOV A, factor analysis, reliability analysis and regression analysis using SPSS version 10. 56.6% of customers get obtained information from the internet, with 31.3% of these using this method at least once a week, but 72.9% of customers used this method less than once per years. The major reasons for ordering home-delivered meals were tired of cooking, more economical and no time to cook. The results were significantly different in relation to age, occupation and monthly income. The major reasons for hesitation about ordering home-delivered meals were meals should be prepared in households, not sanitary and the use of too many artificial flavors. The results for this factor were significantly different in relation to gender, age and monthly income(p<0.01). The most preferred kinds of home-delivery meals were Korean soup (guk), stew, soup (tang), speciality dishes and party dishes. The customer's cognition of kindness of the delivery staff was highest, with food temperature being the lowest among the options. The food and service level factors were derived from a factor based analysis of customer's cognition towards home-delivered meals. The customer's cognition of food taste, food quantity, kindness of delivery staff and packaging container shape were significantly different according to the use frequency and use period. The packaging method, sanitation, kindness of delivery staff, price and taste were the most relatively important attributes for overall satisfaction with home-delivered meals.

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

Evaluation of Dental Hygienist Job Validity according to Judgment Standard of Medical Practice in Medical Law (의료행위 기준에 따른 치과위생사 직무 타당도 평가)

  • Bae, Soo-Myoung;Shin, Sun-Jung;Lee, Hyo-Jin;Shin, Bo-Mi
    • Journal of dental hygiene science
    • /
    • v.18 no.6
    • /
    • pp.357-366
    • /
    • 2018
  • The purpose of this study was to evaluate the validity of dental hygienist job according to judgment standard of medical practice in medical law. In this study, we conducted a self-administered questionnaire survey to evaluate the validity of dental hygienist job for 12 professors of dental college in Gangneung-Wonju National University from November 10 to 20, 2017. We investigated whether the dental hygienist job conforms to the three criteria of medical practice such as disease prevention and treatment, patient care, and health hazard. The response rates were scored and classified into four categories according to the final score. As a result of this study, dental hygienist job are classified into four categories according to judgment standard of medical practice. The higher the level of the category, the higher the degree of difficulty, and the higher the level of expertise and skills required. More than 50% of respondents answered that measuring the gingival pocket, bleeding on probing, professional tooth cleaning, oral health education, counseling after dental treatment are all three criteria for medical treatment. And these were classified into Level 4 group which requires the difficulty and expertise in the final score 4.3. It is necessary to develop and utilize standardized guidelines on the level of knowledge, education, and qualification standards required for dental practice in order to effectively allocate work among the dental personnel while ensuring the health rights of patients in the dental clinic field in Korea. In addition, there is a need to evaluate the various aspects of cost effectiveness, dental health service productivity, and health promotion contribution to dental hygienist jobs, And based on this evidence, it is necessary to continue to expand and adjust the dental hygienist job and to reorganize the dental workforce system.

The Effect of Carbon Dioxide Leaked from Geological Storage Site on Soil Fertility: A Study on Artificial Leakage (지중 저장지로부터 누출된 이산화탄소가 토양 비옥도에 미치는 영향: 인위 누출 연구)

  • Baek, Seung Han;Lee, Sang-Woo;Lee, Woo-Chun;Yun, Seong-Taek;Kim, Soon-Oh
    • Economic and Environmental Geology
    • /
    • v.54 no.4
    • /
    • pp.409-425
    • /
    • 2021
  • Carbon dioxide has been known to be a typical greenhouse gas causing global warming, and a number of efforts have been proposed to reduce its concentration in the atmosphere. Among them, carbon dioxide capture and storage (CCS) has been taken into great account to accomplish the target reduction of carbon dioxide. In order to commercialize the CCS, its safety should be secured. In particular, if the stored carbon dioxide is leaked in the arable land, serious problems could come up in terms of crop growth. This study was conducted to investigate the effect of carbon dioxide leaked from storage sites on soil fertility. The leakage of carbon dioxide was simulated using the facility of its artificial injection into soils in the laboratory. Several soil chemical properties, such as pH, cation exchange capacity, electrical conductivity, the concentrations of exchangeable cations, nitrogen (N) (total-N, nitrate-N, and ammonia-N), phosphorus (P) (total-P and available-P), sulfur (S) (total-S and available-S), available-boron (B), and the contents of soil organic matter, were monitored as indicators of soil fertility during the period of artificial injection of carbon dioxide. Two kinds of soils, such as non-cultivated and cultivated soils, were compared in the artificial injection tests, and the latter included maize- and soybean-cultivated soils. The non-cultivated soil (NCS) was sandy soil of 42.6% porosity, the maize-cultivated soil (MCS) and soybean-cultivated soil (SCS) were loamy sand having 46.8% and 48.0% of porosities, respectively. The artificial injection facility had six columns: one was for the control without carbon dioxide injection, and the other five columns were used for the injections tests. Total injection periods for NCS and MCS/SCS were 60 and 70 days, respectively, and artificial rainfall events were simulated using one pore volume after the 12-day injection for the NCS and the 14-day injection for the MCS/SCS. After each rainfall event, the soil fertility indicators were measured for soil and leachate solution, and they were compared before and after the injection of carbon dioxide. The results indicate that the residual concentrations of exchangeable cations, total-N, total-P, the content of soil organic matter, and electrical conductivity were not likely to be affected by the injection of carbon dioxide. However, the residual concentrations of nitrate-N, ammonia-N, available-P, available-S, and available-B tended to decrease after the carbon dioxide injection, indicating that soil fertility might be reduced. Meanwhile, soil pH did not seem to be influenced due to the buffering capacity of soils, but it is speculated that a long-term leakage of carbon dioxide might bring about soil acidification.

The effects of Allomyrina dichotoma larval extract on palmitate-induced insulin resistance in skeletal muscle cells (장수풍뎅이 유충 추출물이 고지방산 처리 골격근세포의 인슐린 저항성에 미치는 영향)

  • Kim, Kyong;Sim, Mi-Seong;Kwak, Min-Kyu;Jang, Se-Eun;Oh, Yoon Sin
    • Journal of Nutrition and Health
    • /
    • v.55 no.4
    • /
    • pp.462-475
    • /
    • 2022
  • Purpose: Allomyrina dichotoma larvae are one of the approved edible insects with nutritional value and various functional and medicinal properties. Previously we have demonstrated that the Allomyrina dichotoma larval extract (ADLE) ameliorates hepatic insulin resistance in high-fat diet (HFD)-induced diabetic mice through the activation of adenosine monophosphate-activated protein kinase (AMPK). This study investigated the effects of ADLE on insulin resistance in the skeletal muscle and explored mechanisms for enhancing the glucose uptake in palmitate (PAL)-treated C2C12 myotubes. Methods: To induce insulin resistance, the differentiated C2C12 myotubes were treated with PAL (0.5 mM) for 24 hours, and then treated with a 0.5 mg/ml concentration of ADLE, and the resultant effects were measured. The expression levels of glucose transporter-4 (GLUT4), AMPK, and the mitochondrial metabolism-related proteins were analyzed by western blotting. The mRNA expression levels of lipogenesis- related genes were determined by quantitative reverse-transcriptase PCR. Results: The exposure of C2C12 myotubes to 0.5 mg/ml of ADLE increased cell viability significantly compared to PAL-treated cells. ADLE upregulated the protein expression of GLUT4 and enhanced glucose uptake in the PAL-treated cells. ADLE increased the phosphorylated AMPK in both the PAL-treated C2C12 myotubes and HFD-treated skeletal muscle. The reduced expression levels of peroxisome-proliferator-activated receptor gamma co-activator-1 alpha (PGC1α) and uncoupling protein 3 (UCP3) due to the PAL and HFD treatment were reversed by the ADLE treatment. The citrate synthase activity was also significantly increased with the PAL and ADLE co-treatment. Moreover, the mRNA and protein expressions of fatty acid synthesis-related factors were reduced in the PAL and HFD-treated muscle cells, and this effect was significantly attenuated by the ADLE treatment. Conclusion: ADLE activates AMPK, which in turn induces mitochondrial metabolism and reduces fatty acid synthesis in C2C12 myotubes. Therefore, ADLE could be useful for preventing or treating insulin resistance of skeletal muscles in diabetes.

Chinese Maritime Dispute Strategy for territorialization in Korea's West Sea (중국의 한국 서해 내해화 전략 분석)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.113-136
    • /
    • 2022
  • China has been pushing for a systematic strategy for territorialization over a long period of time to invade Korea's West Sea (Yellow Sea) in order to create China's territorial water. China's strategy for territorializing the West Sea is an activity in which China curbs the use of South Korea and enforces the illegal use of China in order to dominate the West Sea exclusively. China aided Chinese fishing boats that engaged in illegal fishing in Korea's jurisdiction as a means to territorialize the West Sea, and is opposed to combined exercise and training of Korea and the United States Naval Forces in the West Sea, while intentionally entering KADIZ(Korea Air Defense Identification Zone). In addition, Beijing used 'scientific exploration and research' measures as a pretext for its strategies in order to encroach on Korea's West Sea. China is carrying out such work to announce to the world that China is a systematic and organized country while consistently attempting to dominate the West Sea. China's activities in the West Sea seriously infringe South Korea's sovereignty. In order to respond to China's strategies of territorialization in the West Sea stated above, I analyzed the rejection effect of the ROK-US combined military training in the West Sea and presented a 'proportional response strategy centered on the ROK-US combined forces'. Korea should be able to respond proportionally to China's activities in the seas around the Korean peninsula, and Korea should be able to neutralize China's attempt to a Fait Accompli. In addition, just as China installs buoys in the Korea-China Provisional Measures Zone, Korea should be able to install and actively utilize some devices in the West Sea and for the use of free and open West Sea. Korea should not just wait for the tragic future to come without preparing for China's gradual and long-term strategy, and Seoul needs to respond to China's maritime policy in the West Sea with a more active attitude than it is now. China has historically taken a bold and aggressive response to neighboring countries that are consistent with a passive attitude, on the other hand, Beijing has taken a cautious approach to neighboring countries that respond with an active attitude. It should not be forgotten that Korea's passive response to the Chinese strategy in the name of a 'realistic approach' such as Korea's economic dependence on China for economy will result in China's success for territorialization of the West Sea.

  • PDF

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF

The 1998, 1999 Patterns of Care Study for Breast Irradiation after Mastectomy in Korea (1998, 1999년도 우리나라에서 시행된 근치적 유방 전절제술 후 방사선치료 현황 조사)

  • Keum,, Ki-Chang;Shim, Su-Jung;Lee, Ik-Jae;Park, Won;Lee, Sang-Wook;Shin, Hyun-Soo;Chung, Eun-Ji;Chie, Eui-Kyu;Kim, Il-Han;Oh, Do-Hoon;Ha, Sung-Whan;Lee, Hyung-Sik;Ahn, Sung-Ja
    • Radiation Oncology Journal
    • /
    • v.25 no.1
    • /
    • pp.7-15
    • /
    • 2007
  • [ $\underline{Purpose}$ ]: To determine the patterns of evaluation and treatment in patients with breast cancer after mastectomy and treated with radiotherapy. A nationwide study was performed with the goal of improving radiotherapy treatment. $\underline{Materials\;and\;Methods}$: A web- based database system for the Korean Patterns of Care Study (PCS) for 6 common cancers was developed. Randomly selected records of 286 eligible patients treated between 1998 and 1999 from 17 hospitals were reviewed. $\underline{Results}$: The ages of the study patients ranged from 20 to 80 years (median age 44 years). The pathologic T stage by the AJCC was T1 in 9.7% of the cases, T2 in 59.2% of the cases, T3 in 25.6% of the cases, and T4 in 5.3% of the cases. For analysis of nodal involvement, N0 was 7.3%, N1 was 14%, N2 was 38.8%, and N3 was 38.5% of the cases. The AJCC stage was stage I in 0.7% of the cases, stage IIa in 3.8% of the cases, stage IIb in 9.8% of the cases, stage IIIa in 43% of the cases, stage IIIb in 2.8% of the cases, and IIIc in 38.5% of the cases. There were various sequences of chemotherapy and radiotherapy after mastectomy. Mastectomy and chemotherapy followed by radiotherapy was the most commonly performed sequence in 47% of the cases. Mastectomy, chemotherapy, and radiotherapy followed by additional chemotherapy was performed in 35% of the cases, and neoadjuvant chemoradiotherapy was performed in 12.5% of the cases. The radiotherapy volume was chest wall only in 5.6% of the cases. The volume was chest wall and supraclavicular fossa (SCL) in 20.3% of the cases; chest wall, SCL and internal mammary lymph node (IMN) in 27.6% of the cases; chest wall, SCL and posterior axillary lymph node in 25.9% of the cases; chest wall, SCL, IMN, and posterior axillary lymph node in 19.9% of the cases. Two patients received IMN only. The method of chest wall irradiation was tangential field in 57.3% of the cases and electron beam in 42% of the cases. A bolus for the chest wall was used in 54.8% of the tangential field cases and 52.5% of the electron beam cases. The radiation dose to the chest wall was $45{\sim}59.4\;Gy$ (median 50.4 Gy), to the SCL was $45{\sim}59.4\;Gy$ (median 50.4 Gy), and to the PAB was $4.8{\sim}38.8\;Gy$, (median 9 Gy) $\underline{Conclusion}$: Different and various treatment methods were used for radiotherapy of the breast cancer patients after mastectomy in each hospital. Most of treatment methods varied in the irradiation of the chest wall. A separate analysis for the details of radiotherapy planning also needs to be followed and the outcome of treatment is needed in order to evaluate the different processes.